π¦Ώ CISOs in Australia Urged to Take a Closer Look at Data Breach Risks π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
A leading cyber lawyer in Australia has warned CISOs and other IT leaders their organisations and careers could be at stake if they do not understand data risk and data governance practices.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
CISOs in Australia Urged to Take a Closer Look at Data Breach Risks
A leading cyber expert in Australia has warned CISOs and other IT leaders the long-term viability of their organisations is at stake due to data risk.
ποΈ Fake Antivirus Websites Deliver Malware to Android and Windows Devices ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Threat actors have been observed making use of fake websites masquerading as legitimate antivirus solutions from Avast, Bitdefender, and Malwarebytes to propagate malware capable of stealing sensitive information from Android and Windows devices. "Hosting malicious software through sites which look legitimate is predatory to general consumers, especially those who look to protect their devices.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Health Information Published Online After MediSecure Ransomware Attack π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
MediSecure confirmed that limited health data of customers was posted onto a dark web forum, with a 6.5TB dataset reportedly put up for sale.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Health Information Published Online After MediSecure Ransomware Attack
MediSecure confirmed that limited health data of customers was posted onto a dark web forum, with a 6.5TB dataset reportedly put up for sale
π΅οΈββοΈ When 'No' & 'Good Enough' Challenge Cybersecurity π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
As the digital landscape evolves, these words must become an impetus for innovation and dialogue, not insurmountable barriers.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
When 'No' & 'Good Enough' Challenge Cybersecurity
As the digital landscape evolves, these words must become an impetus for innovation and dialogue, not insurmountable barriers.
π΅οΈββοΈ The SEC's SolarWinds Case: What CISOs Should Do Now π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The SEC's lawsuit may take years to resolve through litigation, but here are five things CISOs should do now to protect both themselves as individuals as well as their organizations.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
The SECβs SolarWinds Case: What CISOs Should Do Now
The SEC's lawsuit may take years to resolve through litigation, but here are five things CISOs should do now to protect both themselves as individuals as well as their organizations.
π1
π¦Ώ Get a Lifetime of 1TB Cloud Storage for Only $80 With FolderFort π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Fast, affordable cloud storage isnt always easy to find for businesses, but now you can have a massive amount with maximum security.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
π¦Ώ AI Seoul Summit: 4 Key Takeaways on AI Safety Standards and Regulations π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Major breakthroughs were made in global nations AI safety commitments, AI safety institutes, research grants and AI risk thresholds at this months AI Seoul Summit.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
AI Seoul Summit: 4 Key Takeaways on AI Safety Standards and Regulations
Major breakthroughs were made in global nationsβ AI safety commitments, AI safety institutes, research grants and AI risk thresholds at this monthβs AI Seoul Summit.
π΅οΈββοΈ Google Discovers Fourth Zero-Day in Less Than a Month π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
The tech company has rolled out fixes for a type confusion vulnerability that has already been exploited by malicious actors.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
Google Discovers Fourth Zero-Day in Less Than a Month
The tech company has rolled out fixes for a type confusion vulnerability that has already been exploited by malicious actors.
π¦
The Rust Revolution: New Embargo Ransomware Steps In π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Key Takeaways Cyble Research Intelligence Labs CRIL identified a sample of Embargo ransomware, developed in Rust. The Threat Actors behind this ransomware are using double extortion tactics. We observed an instance where the ransomware group Initially demanded a 1 million ransom payment, threatening data leak and notifications to various parties upon nonpayment. The leak site User Interfaces of Embargo and ALPHV ransomware resemble each other. Additionally, the leak site of ALPHV ransomware was taken down by law enforcement in March 2024. The log generation structure of both the ransomware looks similar. Embargo, to date, has disclosed details of four victims globally. This ransomware Utilizes ChaCha20 and Curve25519 for file encryption and appends ".564ba1" ...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
The Rust Revolution: New Embargo Ransomware Steps In - Cyble
Cyble analyzes the Rust-based Embargo ransomware, investigating its operations and possible variants.
π Faraday 5.3.0 π
π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
Faraday is a tool that introduces a new concept called IPE, or Integrated PenetrationTest Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to reuse the available tools in the community to take advantage of them in a multiuser way.π Read more.
π Via "Packet Storm - Tools"
----------
ποΈ Seen on @cibsecurity
Packetstormsecurity
Faraday 5.3.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
ποΈ Hackers Created Rogue VMs to Evade Detection in Recent MITRE Cyber Attack ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The MITRE Corporation has revealed that the cyber attack targeting the notforprofit company towards late December 2023 by exploiting zeroday flaws in Ivanti Connect Secure ICS involved the actor creating rogue virtual machines VMs within its VMware environment. "The adversary created their own rogue VMs within the VMware environment, leveraging compromised vCenter Server access," MITRE.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π΅οΈββοΈ Microsoft's 'Recall' Feature Draws Criticism From Privacy Advocates π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Despite Microsoft's reassurances, multiple security researchers describe the technology as problematic for users and their organizations.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Darkreading
Microsoft's 'Recall' Feature Draws Criticism From Privacy Advocates
Despite Microsoft's reassurances, multiple security researchers describe the technology as problematic for users and their organizations.
π΅οΈββοΈ AI Voice Generator App Used to Drop Gipy Malware π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Users get duped into downloading malicious files disguised to look like an application that uses artificial intelligence to alter voices.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
AI Voice Generator App Used to Drop Gipy Malware
Users get duped into downloading malicious files disguised to look like an application that uses artificial intelligence to alter voices.
𧨠Deepfake Drama: How Gwyneth Paltrow Became the Latest Target in AI Deception π§¨
π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
As technology advances, so do the methods used by cybercriminals to spread misinformation and scams. One of the most concerning... The post Deepfake Drama How Gwyneth Paltrow Became the Latest Target in AI Deception appeared first on McAfee Blog.π Read more.
π Via "McAfee"
----------
ποΈ Seen on @cibsecurity
McAfee Blog
Deepfake Drama: How Gwyneth Paltrow Became the Latest Target in AI Deception | McAfee Blog
As technology advances, so do the methods used by cybercriminals to spread misinformation and scams. One of the most concerning developments in recent
π Mandatory reporting for ransomware attacks? β Week in security with Tony Anscombe π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
As the UK mulls new rules for ransomware disclosure, what would be the wider implications of such a move, how would cyberinsurance come into play, and how might cybercriminals respond?.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
Mandatory reporting for ransomware attacks? β Week in security with Tony Anscombe
As the UK mulls mandatory reporting for ransomware attacks, what would be the wider implications of such a move, how would cyber-insurance come into play, and how might cybercriminals respond?
π2
ποΈ Experts Find Flaw in Replicate AI Service Exposing Customers' Models and Data ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have discovered a critical security flaw in an artificial intelligence AIasaservice provider Replicate that could have allowed threat actors to gain access to proprietary AI models and sensitive information. "Exploitation of this vulnerability would have allowed unauthorized access to the AI prompts and results of all Replicate's platform customers,".π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π΅οΈββοΈ 6 Facts About How Interpol Fights Cybercrime π΅οΈββοΈ
π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
So you think you know Interpol? Here are some key details of how this international law enforcement entity disrupts cybercrime worldwide.π Read more.
π Via "Dark Reading"
----------
ποΈ Seen on @cibsecurity
Dark Reading
6 Facts About How INTERPOL Fights Cybercrime
So you think you know INTERPOL? Here are some key details of how this international law enforcement entity disrupts cybercrime worldwide.
ποΈ Pakistan-linked Hackers Deploy Python, Golang, and Rust Malware on Indian Targets ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The Pakistannexus Transparent Tribe actor has been linked to a new set of attacks targeting Indian government, defense, and aerospace sectors using crossplatform malware written in Python, Golang, and Rust. "This cluster of activity spanned from late 2023 to April 2024 and is anticipated to persist," the BlackBerry Research and Intelligence Team said in a technical report.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π¦Ώ Learn how to Protect your Business with this $30 Cybersecurity Training π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
This extensive bundle includes eight courses from leading instructors covering certification exams from CompTIA and Cisco to set you up for success.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Learn how to Protect your Business with this $30 Cybersecurity Training
This extensive bundle includes eight courses from leading instructors covering certification exams from CompTIA and Cisco to set you up for success.
ποΈ New Tricks in the Phishing Playbook: Cloudflare Workers, HTML Smuggling, GenAI ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers are alerting of phishing campaigns that abuse Cloudflare Workers to serve phishing sites that are used to harvest users' credentials associated with Microsoft, Gmail, Yahoo!, and cPanel Webmail. The attack method, called transparent phishing or adversaryinthemiddle AitM phishing, "uses Cloudflare Workers to act as a reverse proxy server for a.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π1
ποΈ Moroccan Cybercrime Group Steals Up to $100K Daily Through Gift Card Fraud ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Microsoft is calling attention to a Moroccobased cybercrime group dubbed Storm0539 that's behind gift card fraud and theft through highly sophisticated email and SMS phishing attacks. "Their primary motivation is to steal gift cards and profit by selling them online at a discounted rate," the company said in its latest Cyber Signals report. "We've seen some examples where.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity